必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): China

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.94.80.216
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51184
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.94.80.216.			IN	A

;; AUTHORITY SECTION:
.			301	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 77 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 23:24:12 CST 2022
;; MSG SIZE  rcvd: 106
HOST信息:
Host 216.80.94.117.in-addr.arpa. not found: 3(NXDOMAIN)
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 216.80.94.117.in-addr.arpa: NXDOMAIN
相关IP信息:
最新评论:
IP 类型 评论内容 时间
51.15.235.193 attackspambots
[portscan] tcp/22 [SSH]
[scan/connect: 2 time(s)]
*(RWIN=65535)(07301024)
2019-07-30 19:14:14
179.185.65.220 attackbots
445/tcp 445/tcp 445/tcp...
[2019-05-30/07-29]8pkt,1pt.(tcp)
2019-07-30 19:38:29
111.93.140.155 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-05-29/07-29]16pkt,1pt.(tcp)
2019-07-30 19:36:28
114.100.103.123 attackspam
2019-07-30 02:57:06 UTC | Wholesale Football J | gaeeiuag@gmail.com | http://www.cheapjerseysforstitched.us.com/ | 114.100.103.123 | Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko | "You look at that defense, they've had some guys retire over the last year, they've had some guys go other places, so it's a different opponent," Rodgers said.
Wholesale Football Jerseys China http://www.cheapjerseysforstitched.us.com/ |
2019-07-30 19:45:29
120.131.0.201 attack
$f2bV_matches
2019-07-30 19:44:54
213.108.129.236 attack
leo_www
2019-07-30 19:33:53
189.112.100.230 attack
Automatic report - Port Scan Attack
2019-07-30 19:35:21
36.112.137.55 attack
Failed password for invalid user sgyuri from 36.112.137.55 port 46255 ssh2
Invalid user fiscal from 36.112.137.55 port 58539
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.112.137.55
Failed password for invalid user fiscal from 36.112.137.55 port 58539 ssh2
Invalid user newuser from 36.112.137.55 port 42513
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.112.137.55
2019-07-30 19:43:16
80.253.22.130 attack
445/tcp 445/tcp
[2019-06-03/07-29]2pkt
2019-07-30 19:26:18
157.55.39.180 attackbots
Automatic report - Banned IP Access
2019-07-30 19:09:00
110.39.195.102 attack
445/tcp 445/tcp 445/tcp
[2019-06-11/07-29]3pkt
2019-07-30 19:25:30
23.236.75.115 attack
445/tcp 445/tcp 445/tcp...
[2019-06-02/07-29]13pkt,1pt.(tcp)
2019-07-30 19:28:35
148.70.76.34 attack
Jul 30 07:28:17 * sshd[24836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.76.34
Jul 30 07:28:19 * sshd[24836]: Failed password for invalid user omcuser from 148.70.76.34 port 34730 ssh2
2019-07-30 19:02:47
159.203.37.103 attack
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-07-30 19:13:33
112.72.95.111 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-30 19:11:03

最近上报的IP列表

117.94.77.209 117.95.1.22 117.94.86.37 117.95.100.112
117.95.100.105 117.95.100.103 114.235.23.193 117.95.100.14
117.95.1.110 117.95.100.167 117.95.100.12 117.95.100.115
117.95.100.132 117.95.100.156 117.95.100.18 114.235.23.194
117.95.100.183 117.95.100.191 117.95.100.219 117.95.100.215